Studying Computer Networks – II in your third year of BCS can be a bit tricky. Topics like routing, congestion control, TCP/IP layers, subnetting, and network security can be hard to grasp. Many students find it difficult to review everything before tests and exams.
That’s why handwritten notes are so helpful. They are simple, easy to review, and organized in a way that matches what you'll see on exams and viva questions. If you need quick revisions or want to understand concepts better, the TY BCS Computer Networks – II Handwritten Notes PDF can be a great study tool.

Chapter-Wise Breakdown of TY BCS Computer Network - II
Why Choose Handwritten Notes for CN-II?
TY BCS Computer Networks – II Handwritten Notes PDF (Unit-Wise Coverage)
1. Application Layer (10 Lectures)- Domain Name System: Name Space: Flat Name Space, Hierarchical Name Space
- Domain Name Space: Label, Domain Name, FQDN, PQDN
- Distribution of Domain Name Space: Hierarchy of Name Servers, Zone, Root Server, Primary and Secondary Servers
- DNS in the Internet: Generic Domains, Country Domains, Inverse Domain
- Resolution: Resolver, Mapping Names to Address, Mapping Addresses to Names, Recursive Resolution, Iterative Resolution, Caching
- Electronic Mail:
- Architecture: First Scenario, Second Scenario, Third Scenario, Fourth Scenario
- User Agent: Services of User Agent, Types of UA, Format of E-mail
- MIME: MIME Header
- Message Transfer Agent: SMTP
- Message Access Agent: POP and IMAP
- File Transfer:
- FTP: Communication over Data and Control Connection, File Type, Data Structure, Transmission Mode, Anonymous FTP
2. Multimedia (8 Lectures)
- Digitizing Audio and Video, Audio and Video Compression
- Streaming Stored Audio/Video:
- First Approach
- Second Approach
- Third Approach
- Fourth Approach
- Streaming Live Audio/Video
- Real-Time Interactive Audio/Video:
- Characteristics, Time Relationship, Timestamp, Playback Buffer, Ordering, Multicasting, Translation
- RTP: Packet Format
- RTCP: Message Types
- Voice over IP:
- SIP: SIP Session
- H.323: Architecture, Protocols
3. Cryptography and Network Security (9 Lectures)
- Terminology:
- Cryptography, Plain text and Cipher text, Cipher key, Categories of Cryptography: Symmetric Key, Asymmetric Key
- Encryption Model
- Symmetric Key Cryptography:
- Traditional Ciphers: Substitution Cipher, Shift Cipher, Transposition Cipher
- Simple Modern Ciphers: XOR, Rotation Cipher, s-box, p-box
- Modern Round Ciphers: DES
- Mode of Operation: ECB, CBC, CFB, OFB
- Asymmetric Key Cryptography: RSA
- Security Services:
- Message Confidentiality: With Symmetric Key Cryptography, With Asymmetric Key Cryptography
- Message Integrity: Document and Fingerprint, Message and Message Digest
- Message Authentication: MAC, HMAC
- Digital Signature
- Entity Authentication: Passwords, Fixed Passwords, Challenge-response
4. Security in the Internet (9 Lectures)
- IP Security (IPSec):
- Two Modes
- Two Security Protocols
- Services provided by IPSec
- Security Association
- Internet Key Exchange
- Virtual Private Network
- SSL/TLS:
- SSL Services
- Security Parameters
- Sessions and Connections
- Four Protocols
- Transport Layer Security
- PGP:
- Security Parameters
- Services
- PGP Algorithms
- Key Rings
- PGP Certificates
- Firewalls:
- Packet Filter Firewall
- Proxy Firewall
Conclusion
Computer Networks – II might look complicated at first, but using good handwritten notes can help you to:
✔ Learn quicker✔ Study more effectively
✔ Get better grades in exams and presentations
✔ Save time when turning in assignments
FAQ
- Introduction to Computer Networks
- Types of networks (LAN, MAN, WAN)
- Network topologies
- Protocols and their functions
- Error detection and correction methods
- TCP/IP and OSI models